1.800.677.7305

Campbell, CA  |

Blog

Abstract number chart background

CVSS 4.0 is Here!

CVSS is an open standard that is used by security professionals everywhere. In fact, Phoenix uses it each time we issue a final pen testing ...
Read More →
green circuit board

Decoding UEFI Firmware: Unraveling the Intricacies of System Firmware, its Ecosystem and Supply Chain Part 2 of 3

In part 2 of this 3 part series, we explore In the realm of UEFI-based firmware how diverse components, from chip vendor code to specialized ...
Read More →
Abstract laptop with circuit board on screen

Decoding UEFI Firmware: Unraveling the Intricacies of System Firmware, its Ecosystem and Supply Chain Part 1 of 3

In part 1 of this 3 part series, we explore the complexities of system firmware and its connection to the UEFI standard. Understand the evolution ...
Read More →

Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles

Over the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex ...
Read More →

Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation

This is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, ...
Read More →
Interior of autonomous car. Car digitalization concept.

The Top 5 Autonomous Vehicle Security Gaps

This is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, ...
Read More →

Autonomous Vehicle Hacking: Exploring Potential Attack Vectors

This is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. ...
Read More →

Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack

This is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, ...
Read More →

Firmware Protection: How to Solve for Firmware Security Gaps

Device and chip makers have an obligation to improve their firmware protection to defend against threats. If nothing else, they ...
Read More →